Cache-Timing Attack Against HQC

نویسندگان

چکیده

In this paper, we present the first chosen-ciphertext (CC) cache-timing attacks on reference implementation of HQC. We build a based distinguisher for implementing plaintext-checking (PC) oracle. The PC oracle uses side-channel information to check if given ciphertext decrypts message. This is done by identifying vulnerability during generating process two vectors in also propose new method using oracles against HQC, which may have independent interest.We show general proof-of-concept attack, where use Flush+Reload technique and derive, more detail, practical attack an HQC execution Intel SGX, Prime+Probe used. exact path do key recovery explaining detailed steps, both scenarios, requires 53, 857 traces average with much fewer calls than timing Guo et al. CHES 2022 implementation.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Remote Cache-Timing Attack without Learning Phase

Theoretically secure cryptographic algorithms can be vulnerable to attacks due to their implementation flaws, which disclose side-channel information about the secret key. Bernstein’s attack is a well known cache-timing attack which uses execution time as the side-channel. The major drawback of this attack is that it needs an identical target machine to perform its learning phase where the atta...

متن کامل

Minimizing Cache Timing Attack Using Dynamic Cache Flushing (DCF) Algorithm

Rijndael algorithm was unanimously chosen as the Advanced Encryption Standard (AES) by the panel of researchers at National Institute of Standards and Technology (NIST) in October 2000. Since then, Rijndael was destined to be used massively in various software as well as hardware entities for encrypting data. However, a few years back, Daniel Bernstein [2] devised a cachetiming attack that was ...

متن کامل

Differential Cache Trace Attack Against CLEFIA

The paper presents a differential cache trace attack against CLEFIA, a 128 bit block cipher designed by Sony Corporation. The attack shows that such ciphers based on the generalized Feistel structures leak information of the secret key if the cache trace pattern is revealed to an adversary. The attack that we propose is a three staged attack and reveals the entire key with 2 CLEFIA encryptions....

متن کامل

Cache-Collision Timing Attacks Against AES

This paper describes several novel timing attacks against the common table-driven software implementation of the AES cipher. We define a general attack strategy using a simplified model of the cache to predict timing variation due to cache-collisions in the sequence of lookups performed by the encryption. The attacks presented should be applicable to most high-speed software AES implementations...

متن کامل

Cache Based Remote Timing Attack on the AES

We introduce a new robust cache-based timing attack on AES. We present experiments and concrete evidence that our attack can be used to obtain secret keys of remote cryptosystems if the server under attack runs on a multitasking or simultaneous multithreading system with a large enough workload. This is an important difference to recent cache-based timing attacks as these attacks either did not...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IACR transactions on cryptographic hardware and embedded systems

سال: 2023

ISSN: ['2569-2925']

DOI: https://doi.org/10.46586/tches.v2023.i3.136-163